We analyze “coin-wallet” and “balance-wallet” under partial real-time audit, and compute upper bounds on theft due to the fact that not all the transactions are audited in ...
Transactional requirements, from new application domains and execution environments, are varying and may exceed traditional ACID properties. We believe that transactional middlewa...
Anna-Brith Arntsen, Marts Mortensen, Randi Karlsen...
Due to the unpredictability of mobile network, it is difficult to meet transaction deadlines in a mobile distributed real-time database system (MDRDTBS). We propose the idea of tra...
Kam-yiu Lam, Tei-Wei Kuo, Wai-Hung Tsang, Gary C. ...
—PhoneFactor is a two-factor authentication service that combines the knowledge-based authenticator with an objectbased authenticator in which the object-based authenticator has ...
We present a new approach to implementing real-time transactions on memory-resident data on sharedmemory multiprocessors. This approach allows hard deadlines to be supported witho...
James H. Anderson, Rohit Jain, Srikanth Ramamurthy